CVE-2025-9321

WPCasa · WPCasa plugin for WordPress

A critical code injection vulnerability, identified as CVE-2025-9321, has been discovered in the WPCasa plugin for WordPress.

Executive summary

A critical code injection vulnerability, identified as CVE-2025-9321, has been discovered in the WPCasa plugin for WordPress. This flaw allows an unauthenticated, remote attacker to execute arbitrary code on the server hosting the affected website, potentially leading to a complete system compromise. Due to its critical severity (CVSS 9.8), immediate remediation is required to prevent data theft, website defacement, or further network intrusion.

Vulnerability

The vulnerability exists due to insufficient input sanitization and validation within the api_requests function of the WPCasa plugin. A remote attacker can send a specially crafted request to this function, which is then improperly processed and executed as code on the server. Successful exploitation does not require authentication and allows the attacker to run arbitrary commands with the permissions of the web server's user account, leading to a full compromise of the WordPress application and the underlying server.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could lead to a complete compromise of the affected website and its server, resulting in significant business impact. Potential consequences include the theft of sensitive data such as customer information and user credentials, website defacement causing reputational damage, installation of malware or ransomware, and the use of the compromised server as a pivot point to launch further attacks against the internal network.

Remediation

Immediate Action: Immediately update the WPCasa plugin for WordPress to the latest version provided by the vendor, which contains a patch for this vulnerability. After patching, review web server and application logs for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Monitor web server access logs for unusual or malformed requests targeting the WPCasa plugin's API endpoints. Implement file integrity monitoring to detect unauthorized changes to plugin files or the creation of new files in the web directory. Monitor for unexpected outbound network connections from the web server, which could indicate a backdoor communication channel.

Compensating Controls: If immediate patching is not feasible, consider implementing the following controls:

  • Deploy a Web Application Firewall (WAF) with rules specifically designed to block malicious payloads targeting the api_requests function.
  • If the plugin's functionality is not essential, disable the WPCasa plugin entirely until it can be safely updated.
  • Restrict access to the server at the network level, allowing only trusted IP addresses to connect where possible.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability presents a critical and immediate threat to the organization. Due to the high CVSS score and the potential for complete system compromise, immediate patching of all affected WPCasa plugin instances must be the top priority. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity indicates a high likelihood of widespread exploitation once an exploit becomes public. All teams should treat this as an active threat and apply the recommended remediation without delay.